Search

Your search keyword '"Ming-Hour Yang"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Ming-Hour Yang" Remove constraint Author: "Ming-Hour Yang" Topic computer Remove constraint Topic: computer
43 results on '"Ming-Hour Yang"'

Search Results

1. Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions

2. A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

3. Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices

4. Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles

5. A geographic map-based middleware framework to obfuscate smart vehicles’ locations

6. A Secure Partial RFID Ownership Transfer Protocol with Multi-Owners

7. EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication

8. Offline Transferable E-Cash Mechanism

9. An Unlinkable Anonymous Payment Scheme based on near field communication

10. A mobile authentication system resists to shoulder-surfing attacks

11. Multiple-Denomination E-Cash

12. An Anonymous NFC-Based Payment Protocol

13. Novel designated ownership transfer with grouping proof

14. Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries

15. Security Enhanced EMV-Based Mobile Payment Protocol

16. An anonymous e-rental protocol based on ID-based cryptography and NFC

17. Cross Authority Ownership Transfer Protocol Using Mobile RFID

18. A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism

19. Analysis and Improvement of Key Distribution Scheme for Secure Group Communication

20. Secure multiple group ownership transfer protocol for mobile RFID

21. Mobile RFID Mutual Authentication and Ownership Transfer

22. Security analysis of application layer protocols on wireless local area networks

23. Across-authority lightweight ownership transfer protocol

25. Protocol for ownership transfer across authorities: with the ability to assign transfer target

26. Tracing Anonymous Mobile Attackers in Wireless Network

27. A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme

28. Fast Antinoise RFID-Aided Medical Care System

29. A Stop-or-Move Mobility model for PCS networks and its location-tracking strategies

30. A borrow-and-return model to reduce client waiting time for broadcasting-based vod services

31. An Efficient Offline Delegation Protocol in Mobile RFID Environment

32. Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet

33. Data broadcasting and seamless channel transition for highly demanded videos

34. An efficient delegation protocol in mobile RFID networks

35. Offline delegation protocol for mobile RFID

36. Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam

37. Authentication Protocol in Mobile RFID Network

38. Protect mobile RFID location privacy using dynamic identity

39. Tracing Mobile Attackers in Wireless Ad-Hoc Network

40. A traveling salesman mobility model and its location tracking in PCS networks

41. Broadcasting Approaches for VOD Services

42. Lightweight authentication protocol for mobile RFID networks

43. Controlled Delegation Protocol in Mobile RFID Networks

Catalog

Books, media, physical & digital resources